cdktf-cdktf-provider-upcloud 15.6.1__py3-none-any.whl → 15.7.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +5 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.7.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +9 -9
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +4 -4
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/file_storage/__init__.py +1683 -0
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +42 -42
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +38 -38
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +34 -34
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +72 -72
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +46 -46
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +46 -46
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +33 -33
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +228 -228
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +213 -213
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +603 -603
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +369 -369
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +135 -135
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +65 -65
- cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +138 -138
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/network/__init__.py +50 -50
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
- cdktf_cdktf_provider_upcloud/provider/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +139 -139
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/storage/__init__.py +51 -51
- cdktf_cdktf_provider_upcloud/storage_backup/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/storage_template/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
- {cdktf_cdktf_provider_upcloud-15.6.1.dist-info → cdktf_cdktf_provider_upcloud-15.7.0.dist-info}/METADATA +5 -5
- cdktf_cdktf_provider_upcloud-15.7.0.dist-info/RECORD +68 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.6.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-15.6.1.dist-info/RECORD +0 -67
- {cdktf_cdktf_provider_upcloud-15.6.1.dist-info → cdktf_cdktf_provider_upcloud-15.7.0.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-15.6.1.dist-info → cdktf_cdktf_provider_upcloud-15.7.0.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-15.6.1.dist-info → cdktf_cdktf_provider_upcloud-15.7.0.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_firewall_rules`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -44,7 +44,7 @@ class FirewallRules(
|
|
|
44
44
|
metaclass=jsii.JSIIMeta,
|
|
45
45
|
jsii_type="@cdktf/provider-upcloud.firewallRules.FirewallRules",
|
|
46
46
|
):
|
|
47
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules upcloud_firewall_rules}.'''
|
|
48
48
|
|
|
49
49
|
def __init__(
|
|
50
50
|
self,
|
|
@@ -61,12 +61,12 @@ class FirewallRules(
|
|
|
61
61
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
62
62
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
63
63
|
) -> None:
|
|
64
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
64
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules upcloud_firewall_rules} Resource.
|
|
65
65
|
|
|
66
66
|
:param scope: The scope in which to define this construct.
|
|
67
67
|
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
68
|
-
:param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
69
|
-
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
68
|
+
:param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
69
|
+
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
70
70
|
:param connection:
|
|
71
71
|
:param count:
|
|
72
72
|
:param depends_on:
|
|
@@ -106,7 +106,7 @@ class FirewallRules(
|
|
|
106
106
|
|
|
107
107
|
:param scope: The scope in which to define this construct.
|
|
108
108
|
:param import_to_id: The construct id used in the generated config for the FirewallRules to import.
|
|
109
|
-
:param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
109
|
+
:param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#import import section} in the documentation of this resource for the id to use
|
|
110
110
|
:param provider: ? Optional instance of the provider where the FirewallRules to import is found.
|
|
111
111
|
'''
|
|
112
112
|
if __debug__:
|
|
@@ -219,8 +219,8 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
219
219
|
:param lifecycle:
|
|
220
220
|
:param provider:
|
|
221
221
|
:param provisioners:
|
|
222
|
-
:param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
223
|
-
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
222
|
+
:param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
223
|
+
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
224
224
|
'''
|
|
225
225
|
if isinstance(lifecycle, dict):
|
|
226
226
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -323,7 +323,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
323
323
|
def server_id(self) -> builtins.str:
|
|
324
324
|
'''The UUID of the server to be protected with the firewall rules.
|
|
325
325
|
|
|
326
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
326
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
327
327
|
'''
|
|
328
328
|
result = self._values.get("server_id")
|
|
329
329
|
assert result is not None, "Required property 'server_id' is missing"
|
|
@@ -335,7 +335,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
335
335
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]]:
|
|
336
336
|
'''firewall_rule block.
|
|
337
337
|
|
|
338
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
338
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
339
339
|
'''
|
|
340
340
|
result = self._values.get("firewall_rule")
|
|
341
341
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]], result)
|
|
@@ -392,20 +392,20 @@ class FirewallRulesFirewallRule:
|
|
|
392
392
|
source_port_start: typing.Optional[builtins.str] = None,
|
|
393
393
|
) -> None:
|
|
394
394
|
'''
|
|
395
|
-
:param action: Action to take if the rule conditions are met. Valid values ``accept | drop``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
396
|
-
:param direction: The direction of network traffic this rule will be applied to. Valid values are ``in`` and ``out``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
397
|
-
:param comment: A comment for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
398
|
-
:param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
399
|
-
:param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
400
|
-
:param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
401
|
-
:param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
402
|
-
:param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
403
|
-
:param icmp_type: The ICMP type of the rule. Only valid if protocol is ICMP. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
404
|
-
:param protocol: The protocol of the rule. Possible values are `` (empty), ``tcp``, ``udp``, ``icmp``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
405
|
-
:param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
406
|
-
:param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
407
|
-
:param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
408
|
-
:param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
395
|
+
:param action: Action to take if the rule conditions are met. Valid values ``accept | drop``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#action FirewallRules#action}
|
|
396
|
+
:param direction: The direction of network traffic this rule will be applied to. Valid values are ``in`` and ``out``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#direction FirewallRules#direction}
|
|
397
|
+
:param comment: A comment for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#comment FirewallRules#comment}
|
|
398
|
+
:param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
|
|
399
|
+
:param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
|
|
400
|
+
:param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
|
|
401
|
+
:param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
|
|
402
|
+
:param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#family FirewallRules#family}
|
|
403
|
+
:param icmp_type: The ICMP type of the rule. Only valid if protocol is ICMP. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
|
|
404
|
+
:param protocol: The protocol of the rule. Possible values are `` (empty), ``tcp``, ``udp``, ``icmp``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
|
|
405
|
+
:param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
|
|
406
|
+
:param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
|
|
407
|
+
:param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
|
|
408
|
+
:param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
|
|
409
409
|
'''
|
|
410
410
|
if __debug__:
|
|
411
411
|
type_hints = typing.get_type_hints(_typecheckingstub__9b77e978fb66d25b46f06da19493b15c4f42527dec58b7335729cf86141901af)
|
|
@@ -456,7 +456,7 @@ class FirewallRulesFirewallRule:
|
|
|
456
456
|
def action(self) -> builtins.str:
|
|
457
457
|
'''Action to take if the rule conditions are met. Valid values ``accept | drop``.
|
|
458
458
|
|
|
459
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
459
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#action FirewallRules#action}
|
|
460
460
|
'''
|
|
461
461
|
result = self._values.get("action")
|
|
462
462
|
assert result is not None, "Required property 'action' is missing"
|
|
@@ -466,7 +466,7 @@ class FirewallRulesFirewallRule:
|
|
|
466
466
|
def direction(self) -> builtins.str:
|
|
467
467
|
'''The direction of network traffic this rule will be applied to. Valid values are ``in`` and ``out``.
|
|
468
468
|
|
|
469
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
469
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#direction FirewallRules#direction}
|
|
470
470
|
'''
|
|
471
471
|
result = self._values.get("direction")
|
|
472
472
|
assert result is not None, "Required property 'direction' is missing"
|
|
@@ -476,7 +476,7 @@ class FirewallRulesFirewallRule:
|
|
|
476
476
|
def comment(self) -> typing.Optional[builtins.str]:
|
|
477
477
|
'''A comment for the rule.
|
|
478
478
|
|
|
479
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
479
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#comment FirewallRules#comment}
|
|
480
480
|
'''
|
|
481
481
|
result = self._values.get("comment")
|
|
482
482
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -485,7 +485,7 @@ class FirewallRulesFirewallRule:
|
|
|
485
485
|
def destination_address_end(self) -> typing.Optional[builtins.str]:
|
|
486
486
|
'''The destination address range ends from this address.
|
|
487
487
|
|
|
488
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
488
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
|
|
489
489
|
'''
|
|
490
490
|
result = self._values.get("destination_address_end")
|
|
491
491
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -494,7 +494,7 @@ class FirewallRulesFirewallRule:
|
|
|
494
494
|
def destination_address_start(self) -> typing.Optional[builtins.str]:
|
|
495
495
|
'''The destination address range starts from this address.
|
|
496
496
|
|
|
497
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
497
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
|
|
498
498
|
'''
|
|
499
499
|
result = self._values.get("destination_address_start")
|
|
500
500
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -503,7 +503,7 @@ class FirewallRulesFirewallRule:
|
|
|
503
503
|
def destination_port_end(self) -> typing.Optional[builtins.str]:
|
|
504
504
|
'''The destination port range ends from this port number.
|
|
505
505
|
|
|
506
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
506
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
|
|
507
507
|
'''
|
|
508
508
|
result = self._values.get("destination_port_end")
|
|
509
509
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -512,7 +512,7 @@ class FirewallRulesFirewallRule:
|
|
|
512
512
|
def destination_port_start(self) -> typing.Optional[builtins.str]:
|
|
513
513
|
'''The destination port range starts from this port number.
|
|
514
514
|
|
|
515
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
515
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
|
|
516
516
|
'''
|
|
517
517
|
result = self._values.get("destination_port_start")
|
|
518
518
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -521,7 +521,7 @@ class FirewallRulesFirewallRule:
|
|
|
521
521
|
def family(self) -> typing.Optional[builtins.str]:
|
|
522
522
|
'''The address family of new firewall rule.
|
|
523
523
|
|
|
524
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
524
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#family FirewallRules#family}
|
|
525
525
|
'''
|
|
526
526
|
result = self._values.get("family")
|
|
527
527
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -530,7 +530,7 @@ class FirewallRulesFirewallRule:
|
|
|
530
530
|
def icmp_type(self) -> typing.Optional[builtins.str]:
|
|
531
531
|
'''The ICMP type of the rule. Only valid if protocol is ICMP.
|
|
532
532
|
|
|
533
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
533
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
|
|
534
534
|
'''
|
|
535
535
|
result = self._values.get("icmp_type")
|
|
536
536
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -539,7 +539,7 @@ class FirewallRulesFirewallRule:
|
|
|
539
539
|
def protocol(self) -> typing.Optional[builtins.str]:
|
|
540
540
|
'''The protocol of the rule. Possible values are `` (empty), ``tcp``, ``udp``, ``icmp``.
|
|
541
541
|
|
|
542
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
542
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
|
|
543
543
|
'''
|
|
544
544
|
result = self._values.get("protocol")
|
|
545
545
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -548,7 +548,7 @@ class FirewallRulesFirewallRule:
|
|
|
548
548
|
def source_address_end(self) -> typing.Optional[builtins.str]:
|
|
549
549
|
'''The source address range ends from this address.
|
|
550
550
|
|
|
551
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
551
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
|
|
552
552
|
'''
|
|
553
553
|
result = self._values.get("source_address_end")
|
|
554
554
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -557,7 +557,7 @@ class FirewallRulesFirewallRule:
|
|
|
557
557
|
def source_address_start(self) -> typing.Optional[builtins.str]:
|
|
558
558
|
'''The source address range starts from this address.
|
|
559
559
|
|
|
560
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
560
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
|
|
561
561
|
'''
|
|
562
562
|
result = self._values.get("source_address_start")
|
|
563
563
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -566,7 +566,7 @@ class FirewallRulesFirewallRule:
|
|
|
566
566
|
def source_port_end(self) -> typing.Optional[builtins.str]:
|
|
567
567
|
'''The source port range ends from this port number.
|
|
568
568
|
|
|
569
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
569
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
|
|
570
570
|
'''
|
|
571
571
|
result = self._values.get("source_port_end")
|
|
572
572
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -575,7 +575,7 @@ class FirewallRulesFirewallRule:
|
|
|
575
575
|
def source_port_start(self) -> typing.Optional[builtins.str]:
|
|
576
576
|
'''The source port range starts from this port number.
|
|
577
577
|
|
|
578
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
578
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
|
|
579
579
|
'''
|
|
580
580
|
result = self._values.get("source_port_start")
|
|
581
581
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -998,13 +998,13 @@ class FirewallRulesFirewallRuleOutputReference(
|
|
|
998
998
|
@jsii.member(jsii_name="internalValue")
|
|
999
999
|
def internal_value(
|
|
1000
1000
|
self,
|
|
1001
|
-
) -> typing.Optional[typing.Union[
|
|
1002
|
-
return typing.cast(typing.Optional[typing.Union[
|
|
1001
|
+
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, FirewallRulesFirewallRule]]:
|
|
1002
|
+
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, FirewallRulesFirewallRule]], jsii.get(self, "internalValue"))
|
|
1003
1003
|
|
|
1004
1004
|
@internal_value.setter
|
|
1005
1005
|
def internal_value(
|
|
1006
1006
|
self,
|
|
1007
|
-
value: typing.Optional[typing.Union[
|
|
1007
|
+
value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, FirewallRulesFirewallRule]],
|
|
1008
1008
|
) -> None:
|
|
1009
1009
|
if __debug__:
|
|
1010
1010
|
type_hints = typing.get_type_hints(_typecheckingstub__caf76bc209bb05575c5fe33f2a065f78e22a3cad53fce656b4371ab3233464d7)
|
|
@@ -1227,7 +1227,7 @@ def _typecheckingstub__b4e448528c042dda5a3679431eace4acbc8a79820637256ca64a7cb94
|
|
|
1227
1227
|
pass
|
|
1228
1228
|
|
|
1229
1229
|
def _typecheckingstub__caf76bc209bb05575c5fe33f2a065f78e22a3cad53fce656b4371ab3233464d7(
|
|
1230
|
-
value: typing.Optional[typing.Union[
|
|
1230
|
+
value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, FirewallRulesFirewallRule]],
|
|
1231
1231
|
) -> None:
|
|
1232
1232
|
"""Type checking stubs"""
|
|
1233
1233
|
pass
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_floating_ip_address`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -44,7 +44,7 @@ class FloatingIpAddress(
|
|
|
44
44
|
metaclass=jsii.JSIIMeta,
|
|
45
45
|
jsii_type="@cdktf/provider-upcloud.floatingIpAddress.FloatingIpAddress",
|
|
46
46
|
):
|
|
47
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address upcloud_floating_ip_address}.'''
|
|
48
48
|
|
|
49
49
|
def __init__(
|
|
50
50
|
self,
|
|
@@ -64,15 +64,15 @@ class FloatingIpAddress(
|
|
|
64
64
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
65
65
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
66
66
|
) -> None:
|
|
67
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
67
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address upcloud_floating_ip_address} Resource.
|
|
68
68
|
|
|
69
69
|
:param scope: The scope in which to define this construct.
|
|
70
70
|
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
71
|
-
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
72
|
-
:param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
73
|
-
:param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
74
|
-
:param release_policy: The release policy of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
75
|
-
:param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
71
|
+
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
|
|
72
|
+
:param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
|
|
73
|
+
:param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
|
|
74
|
+
:param release_policy: The release policy of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#release_policy FloatingIpAddress#release_policy}
|
|
75
|
+
:param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
|
|
76
76
|
:param connection:
|
|
77
77
|
:param count:
|
|
78
78
|
:param depends_on:
|
|
@@ -115,7 +115,7 @@ class FloatingIpAddress(
|
|
|
115
115
|
|
|
116
116
|
:param scope: The scope in which to define this construct.
|
|
117
117
|
:param import_to_id: The construct id used in the generated config for the FloatingIpAddress to import.
|
|
118
|
-
:param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
118
|
+
:param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#import import section} in the documentation of this resource for the id to use
|
|
119
119
|
:param provider: ? Optional instance of the provider where the FloatingIpAddress to import is found.
|
|
120
120
|
'''
|
|
121
121
|
if __debug__:
|
|
@@ -298,11 +298,11 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
298
298
|
:param lifecycle:
|
|
299
299
|
:param provider:
|
|
300
300
|
:param provisioners:
|
|
301
|
-
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
302
|
-
:param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
303
|
-
:param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
304
|
-
:param release_policy: The release policy of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
305
|
-
:param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
301
|
+
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
|
|
302
|
+
:param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
|
|
303
|
+
:param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
|
|
304
|
+
:param release_policy: The release policy of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#release_policy FloatingIpAddress#release_policy}
|
|
305
|
+
:param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
|
|
306
306
|
'''
|
|
307
307
|
if isinstance(lifecycle, dict):
|
|
308
308
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -414,7 +414,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
414
414
|
def access(self) -> typing.Optional[builtins.str]:
|
|
415
415
|
'''Network access for the floating IP address. Supported value: ``public``.
|
|
416
416
|
|
|
417
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
417
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
|
|
418
418
|
'''
|
|
419
419
|
result = self._values.get("access")
|
|
420
420
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -423,7 +423,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
423
423
|
def family(self) -> typing.Optional[builtins.str]:
|
|
424
424
|
'''The address family of the floating IP address.
|
|
425
425
|
|
|
426
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
426
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
|
|
427
427
|
'''
|
|
428
428
|
result = self._values.get("family")
|
|
429
429
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -432,7 +432,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
432
432
|
def mac_address(self) -> typing.Optional[builtins.str]:
|
|
433
433
|
'''MAC address of a server interface to assign address to.
|
|
434
434
|
|
|
435
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
435
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
|
|
436
436
|
'''
|
|
437
437
|
result = self._values.get("mac_address")
|
|
438
438
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -441,7 +441,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
441
441
|
def release_policy(self) -> typing.Optional[builtins.str]:
|
|
442
442
|
'''The release policy of the floating IP address.
|
|
443
443
|
|
|
444
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
444
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#release_policy FloatingIpAddress#release_policy}
|
|
445
445
|
'''
|
|
446
446
|
result = self._values.get("release_policy")
|
|
447
447
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -450,7 +450,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
450
450
|
def zone(self) -> typing.Optional[builtins.str]:
|
|
451
451
|
'''Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``.
|
|
452
452
|
|
|
453
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
453
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
|
|
454
454
|
'''
|
|
455
455
|
result = self._values.get("zone")
|
|
456
456
|
return typing.cast(typing.Optional[builtins.str], result)
|